FIELD OF THE INVENTIONThe present invention relates to a network system for connecting a specific client to a specific server via the Internet and a method for purchasing a purchase using the network system, plug-in software for an Internet browser, a network system using the plug-in software and a method for purchasing a purchase using the network system.
BACKGROUND OF THE INVENTIONGenerally, a server on the Internet has any number of pieces of electronic information requiring the duty to protect the information. Connecting a client to a server on the Internet, an open Web browser (Internet browser) is often used and a third party can easily access the server. Therefore, in such an Internet environment, for ensuring security of electronic information, data encryption and authentication technology for logging in are required.
For example,
- {circle around (1)} a user to access the server is given a password and a user ID for identification (hereafter, these are brought together and referred to as a log-in ID),
- {circle around (2)} said log-in ID is a combination of characters and numerical characters on a random basis,
- {circle around (3)} said log-in ID is encrypted,
therefore, the server is prevented from third-party stealing and browsing.
However, in the case of {circle around (2)}, when a combination of characters and numerical characters on a random basis is to be an ideal log-in ID, the log-in ID is difficult remember and easy to forget. Therefore, in actuality, the date of birth, postal address or the like can only used for an log-in ID, which is easily guessed by a third party, or a log-in ID has no choice but to be separately maintained in a form or the like and stored. As mentioned above, the log-in ID is easily stolen, and when the log-in ID is stolen, the worth of the log-in ID is impaired. Therefore, no matter how more advanced cryptographic technology of {circle around (3)} is, it is difficult to prevent a log-in ID from being stolen and the log-in ID is forced to be made complicated changes.
Therefore, technical problems arise that should be resolved in order to make changes automatically on a regular basis to a password for authenticating a server and a client mutually. An object of the present invention is to resolve these problems.
SUMMARY OF THE INVENTIONA first aspect of the present invention provides a network system for connecting a client to a server via the Internet, wherein when a log-in ID transmitted by said client matches a log-in ID stored in said server, said client receives permission to log in to said server;
wherein said server and client have:
system clock synchronous means for synchronizing a system clock to the Internet Standard Time;
storing means for arranging and storing a plurality of log-in IDs for authenticating said server and client mutually; and
log-in ID changing means for searching repeatedly from the top to the bottom of a plurality of log-in IDs stored in said storing means, and updating a log-in ID searched at predetermined intervals as the most current log-in ID every time searching.
A second aspect of the present invention provides a method for purchasing a purchase using the network system of the first aspect, comprising:
placing a client on a manufacturer or vendor of an electrical and electronic component;
storing in a server purchase information about specifications, a price and the like and test information about quality, performance, compatibility and the like regarding an electrical and electronic component; and
ordering from said manufacturer or vendor via the Internet an electrical and electronic component studied on the basis of stored information in said server.
A third aspect of the present invention provides plug-in software for an Internet browser operating a computer as communication means transmitting and receiving electronic data via the Internet;
wherein said computer is operated as:
system clock synchronous means for getting the Internet Standard Time from the Internet and for synchronizing a system clock of said computer to the Internet Standard Time;
storing means for arranging and storing a plurality of log-in IDs previously received permission from a computer on the side of a server;
log-in ID changing means for searching repeatedly from the top to the bottom of a plurality of log-in IDs stored in said storing means, and updating a log-in ID searched at predetermined intervals as the most current log-in ID every time searching; and
transmit/receive means for transmitting the most current log-in ID to the computer on the side of said server and logging in to said server.
A fourth aspect of the present invention provides a network system using the plug-in software for an Internet browser of the third aspect, wherein a computer with said plug-in software for an Internet browser installed is connected as a client to the Internet and information is transmitted and received between a server and said client.
A fifth aspect of the present invention provides a method for purchasing a purchase using the network system of the fourth aspect, comprising:
placing a client on a manufacturer or vendor of an electrical and electronic component;
storing in a server purchase information about specifications, a price and the like and test information about quality, performance, compatibility and the like regarding an electrical and electronic component; and
ordering from said manufacturer or vendor via the Internet an electrical and electronic component studied on the basis of stored information in said server.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a schematic block diagram showing a network system according to the present invention.
FIG. 2 is a block diagram showing functions of a server and client according to the present invention.
FIG. 3 is a block diagram showing configuration of a server and client according to the present invention.
FIG. 4 is a block diagram showing a procedure of log-in of a client to a server according to the present invention.
FIG. 5 is a block diagram showing a network system for purchasing an electrical and electronic component according to the present invention.
FIG. 6 is a view showing reference times of a log-in ID and a log-in ID decided every reference time of a network system according to the present invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTSAn embodiment of the present invention will now be described by referring toFIGS. 1 to 6.FIG. 1 is a block diagram showing a network system of the present invention andFIGS. 2 and 3 are block diagrams showing a system of a server and client.
As shown inFIG. 1, the network system connects aserver1 to a plurality ofclients2 on the open Internet wherein theserver1 and theclient2 comprise a computer.
As shown inFIG. 2, starting media of theserver1, e.g., a hard disc (storing means), comes preinstalled with an operating system (OS), software and a maintenance program. The operating system operates theserver1 as a computer. The software operates theserver1 as an Internet browser (hereafter referred to as the Web). The maintenance program always prohibits an unauthorized person from cracking such as browsing data, rewriting and the like. Starting media of theclient2, e.g., a hard disc (storing means), comes preinstalled with an operating system OS and software. The operating system operates theclient2 as a computer. The software operates theclient2 as the Web. The operating system OS used by theserver1 may be identical with the operating system OS used by theclient2 or may be different to it, as well known.
As shown inFIGS. 2 and 3, theserver1 has hardware resources such as processing means (CPU or MPU)3 for processing data, storing means (HD: hard disc, memory, and the like)4 for storing data, read/write means (FDD and the like)5 for reading and writing data, asystem clock6, transmit/receive means7 for transmitting and receiving, and the like. Theserver1 further has log-in ID changing means8 for changing a log-in ID to be collated with a log-in ID of theclient2, and system clock synchronous means9 for synchronizing thesystem clock6 to the Internet Standard Time.
In a like manner, theclient2 has processing means (CPU or MPU)10 for processing data, storing means (HD: hard disc, memory, and the like)11 for storing data, read/write means (FDD and the like)16 for reading and writing data, asystem clock12. Theclient2 further has log-inID changing means13 for controlling these hardware resources and changing a log-in ID to be collated with a log-in ID of theserver1, system clock synchronous means14 for synchronizing thesystem clock12 to the Internet Standard Time, transmit/receivemeans15 for transmitting and receiving, and the like.
Next, operation and procedure of theserver1 and theclient2 will now be described by referring toFIGS. 1 to 4 between the instant when theclient2 logs in for the first time and the instant when a log-in ID is changed.
When theclient2 requests log-in from theserver1 via the Internet, the processing means3 of theserver1 determines by the presence or absence of a log-in ID whether theclient2 is a first-time client which requests log-in for the first time, i.e., whether theclient2 is a first-time network subscriber.
More specifically, when theclient2 transmits a log-in ID mutually authenticated by theserver1 and theclient2, the processing means3 of theserver1 regards theclient2 as an authorized network subscriber and gives permission to log in to theserver1. When theclient2 transmits a log-in ID not mutually authenticated by theserver1 and theclient2, the processing means3 regards theclient2 as a first-time client and asks to conclude a contract for subscription to the network. A log-in ID for receiving permission of log-in from that time onward is given to only theclient2 who has concluded a contract. With the log-in ID, a log-in ID for mutual authentication is changed automatically between theserver1 and theclient2 to subscribe to the network. Therefore, authentication of theclient2 is convenient and the security of the network is ensured.
Specifically speaking, as shown inFIGS. 2 and 4, first, theserver1 concludes a transaction contract with a network subscriber operating theclient2. Next, theserver1 transmits a connecting program P to theclient2 for subscription to the network (seeFIG. 2 and {circle around (1)} ofFIG. 4). Theclient2 operates the connecting program P, initialization for log-in is performed (see {circle around (2)} ofFIG. 4) and a log-in ID and start address are transmitted to the server1 (see {circle around (3)} ofFIG. 4) by the connecting program P transmitted to theclient2. The log-in ID is mutually authenticated by theserver1 and theclient2. Theserver1 performs reconstruction of the log-in ID and start address transmitted by theclient2, and authentication for the first time is performed. Theserver1 changes the shared log-in ID of theserver1 and theclient2 on the basis of the Internet Standard Time at predetermined intervals (see {circle around (4)} ofFIG. 4). Therefore, authentication of theclient2 is convenient and the security of the network is improved (see {circle around (5)} and {circle around (6)} ofFIG. 4).
The transaction contract will now be described in detail. The processing means3 of theserver1 readselectronic file20 previously stored in the storing means4 and transmits theelectronic file20 to theclient2 via the Internet IT (seeFIG. 1). Theclient2 receives theelectronic file20 and responds a network subscription signal. The transaction contract is completed by the transmitting operation and the response operation.
In this case, theelectronic file20 includes protect contract provisions regarding the duty of theserver1 and theclient2 to mutually protect information, cancellation provisions, penal provisions applicable to nonperformance of the duty, and provisions required by law for the contract. Theelectronic file20 further includes an explanation of handling regarding access to theserver1. Theelectronic file20 displays a consent button (not shown) for theclient2 to conclude the contract and a cancellation button (not shown) for theclient2 not to conclude the contract and reject it. The consent button and cancellation button correspond to operation of akeyboard23 and amouse24 of theclient2. Therefore, when theclient2 pushes the consent button, a network subscription signal is transmitted to theserver1. When theclient2 pushes the cancellation button, a network non-subscription signal is transmitted to theserver1.
When theclient2 pushes the consent button and a network subscription signal is transmitted to theserver1, theserver1 regards theclient2 as a user of an authorized subscriber to the network of theserver1. Theserver1 attaches the connecting program P to e-mail and transmits it to theclient2, and, onto the storing means4 of theserver1, records a log-in ID for log-in formalities (hereafter, referred to a first-time formality ID) included in the connecting program P transmitted to theclient2. Thus, the transaction contract with theclient2 is completed.
Next, the user of theclient2 operates the connecting program P and performs formalities for log-in (see {circle around (2)} ofFIG. 4).
As shown inFIG. 2, the connecting program P is the so-called plug-in software for extending the functionality of the Web of theclient2. The connecting program P includes an initialization program P1, a log-in ID transmitting program P2, a time setting program P3, and a log-in ID changing program P5. The initialization program P1 is initiated only at first-time log-in. The log-in ID transmitting program P2 transmits automatically a first-time formality ID and a log-in ID to theclient2. The time setting program P3 makes theclient2 log in to the Internet time server (seeFIG. 3) of the Internet IT to get the Internet Standard Time, and synchronizes thesystem clock12 of theclient2 to the Internet Standard Time. The log-in ID changing program P5 changes the log-in ID on the basis of an address table P4 for decisions about a log-in ID.
When the usr of theclient2 initiates the connecting program P, the initialization program P1 shown inFIG. 2 is initiated firstly and subsequently the time setting program P3 is initiated.
The initialization program P1 initiates initialization means22 shown inFIG. 3 and it is initiated only one-time for getting a log-in ID. When the initialization program P1 is initiated, a first-time formality ID attached to the connecting program P is stored in the storing means11 of theclient2, and a first-time formality ID preinstalled on the connecting program P is erased from the storing means11. In the embodiment ofFIG. 4, a first-time formality ID is stored in a hard disc.
The time setting program P3 operates the system clock synchronous means14. When the time setting program P3 is initiated, it gets the Internet Standard Time from the Internet time server connected to the Internet IT, and subsequently synchronizes thesystem clock12 of theclient2 to the Internet Standard Time. Thus, the time setting program P3 is completed. The time setting program P3 may be initiated before operating the initialization program P1.
The initialization program P1 and the time setting program P3 are completed, and the log-in ID transmitting program P2 is initiated. The first-time formality ID stored in the storing means11 of theclient2 is transmitted to theserver1.
The processing means3 of theserver1 collates the first-time formality ID transmitted from theclient2 with a log-in inquiry list (not shown) stored in the storing means4 of theserver1. At first-time log-in, the first-time formality ID of theserver1 matches the first-time formality ID of theclient2. Therefore, theclient2 is not rejected and can log in to theserver1.
When the first-time formality ID is transmitted, a log-in ID changing program P6 shown inFIG. 2 transmits a log-in ID changing signal to the log-in ID changing program P5 of theclient2 in order to change a log-in ID. Therefore, the processing means10 of theclient2 initiates the log-in ID changing means13 of theclient2 and starts the change in the log-in ID.
The log-in ID changing program P6 of theserver1 comes installed with a time setting program (not shown) as a part thereof. The time setting program is initiated on a regular basis or as required by theclient2 to log in. The time setting program operates the system clock synchronous means9 of theserver1 to get the Internet Standard Time from the Internet time server of the Internet IT, and synchronizes thesystem clock6 of theserver1 to the Internet Standard Time.
The log-in ID changing means8 of theserver1 is initiated and theserver1 transmits a start signal for changing a log-in ID toward theclient2. The log-in ID changing program P5 of theclient2 is initiated, and starts the change in the log-in ID.
First, a log-in ID is decided on the basis of the address table P4 stored in the storing means11 of the client2 (see {circle around (7)} ofFIG. 4).
The address table P4 of theclient2 is identical to an address table P7 stored in the storing means4 of theserver1. Each of the addresses from the top to the bottom of the address table P4 links with a mutually different log-in ID. Each log-in ID is made on the basis of its own random numbers table and enciphered highly.
The log-in ID changing program P5 of theclient2 is initiated and the log-in ID changing means13 of theclient2 shown inFIG. 3 is operated. The log-in ID changing means13 performs addition wherein a predetermined address of the address table P4 of theclient2, e.g., a top address, is set to a start address, from the top to the bottom of the address table P4. An addition address is obtained from the addition by the log-in ID changing means13 at predetermined intervals, and links with one log-in ID. The log-in ID changing means13 recognizes this log-in ID as the most current log-in ID every addition (see {circle around (8)} ofFIG. 4), and transmits the most current log-in ID and the addition address linking therewith to theserver1 every addition (see {circle around (3)} ofFIG. 4).
The most current log-in ID and the addition address linking therewith are stored in the storing means11 of theclient2 every addition, and the last time log-in ID and the addition address linking therewith are erased.FIG. 6 is one example of reference times of a log-in ID and a log-in ID decided every reference time.
On the side of theserver1, when theclient2 transmits a log-in ID changing command to theserver1 for the first time, the log-in ID changing means8 decides a log-in ID on the basis of the address table P7 to collate (see {circle around (9)} ofFIG. 4). The address table P7 is identical to the address table P4 of theclient2.
In this case, as is the case with the log-in ID changing means13 of theclient2, the log-in ID changing means8 performs addition from a predetermined start address to the bottom of the address table P7 repeatedly. An addition address is obtained from the addition by the log-in ID changing means8 at predetermined intervals, and links with one log-in ID. The log-in ID changing means8 recognizes this log-in ID as a collating log-in ID every addition (see A ofFIG. 4).
At first, the addition address links with the most current log-in ID, which is transmitted from theclient2 for the first time, and the addition address is set to the start address. A log-in ID linking with the start address is used for collating, and theclient2 receives permission to continue to log in.
Next, a log-in ID links with the addition address obtained from the addition at predetermined intervals in synchronism with theclient2, and this log-in ID is set to the most current collating log-in ID every addition.
The most current log-in ID and the addition address linking therewith are stored in the storing means4 of theserver1, and more specifically, in a log-in ID list (see B ofFIG. 4). The last time collating log-in ID and the addition address linking therewith are erased from the storing means4 of theserver1.
Therefore, the most current log-in ID transmitted from theclient2 matches always the most current log-in ID of theserver1, and theclient2 can continue to log in.
After log-off of theclient2, when theclient2 requests log-in again, both theclient2 and theserver1 collate the most current log-in ID. Therefore, log-in of theclient2 to theserver1 is ensured.
Therefore, the user of the client2 (network subscriber) has access to theserver1 using the log-in ID changed automatically at predetermined intervals. An administrator operating theserver1 rejects access except in cases where thespecific client2 who has concluded a contract accesses theserver1. Thus, the security is ensured up to a point. The first-time formality ID is erased from theclient2 and from theserver1 at the completion of the first-time formalities for log-in. Therefore, even if a third party copies and steals the connecting program P, the third party cannot log in to theserver1. As a result, the security is substantially improved also in this respect.
A network system for purchasing an electrical and electronic component will now be described below as a commercial network system for purchasing an electrical and electronic component.
A price of an electrical and electronic component varies as well known with labor costs, production facilities, production environment, political realities, an economy, and the like. Especially, technological innovation of an electrical and electronic component used for a computer, a printer, a cellular phone, or the like has made remarkable progress in recent years. Assuming that the supply from production capacity of one company is insufficient, the fact is that the company places specifications of an electrical and electronic component and interchangeable component in the public domain, and the company licenses to manufacture the an electrical and electronic component. On the other hand, a licensed producer and producer of the interchangeable component wants to get competitiveness of the products thereof therefore intends to set the products thereof at low prices with the added functions. A circuit designer, i.e., recruiter of the interchangeable component, wants to make a reappraisal of the circuit, cut costs, and the like therefore contemplates aggressively using the interchangeable component put on the market later. However, even if the price, performance, and the like of the interchangeable component are superior to others, there is no guarantee that the interchangeable component is operated with stability in fact and compatible with the electrical and electronic component.
Therefore, as an alternative to the circuit designer, there is a need for business to survey the price, specifications, and the like of an electrical and electronic component, to check whether the electrical and electronic component is operated with stability in fact to provide the information with the circuit designer.
As shown inFIG. 5, theclient2 is placed on an electrical and electronic component producing region of each country, i.e., neighboring countries such as Hong Kong, Taiwan, or the like, or on a manufacturer thereof, or in the vicinity of the market. Purchase information about specifications, price, quality and the like provided by theclient2 and test information about an acceptance test, performance test and the like in a segment of test and research are stored in theserver1 in real time via the Internet IT.
Of course, theclient2 is also placed on the circuit designer and the segment of test and research, and connected each other via theserver1 and the Internet IT. Theclient2 on the circuit designer transmits information about specifications, price, stability under operating conditions, adaptation and the like, which are required by the circuit designer, to be stored in theserver1. Theclient2 on the segment of test and research transmits the test information about an acceptance test, performance test and the like to be stored in theserver1.
The side of theserver1 grasps the specifications and the like required by the circuit designer and stored in theserver1 and selects a few electrical and electronic components concluded to satisfy the specifications and the like and orders the components from theclient2 placed on a vendor (manufacturer) by e-mail.
The components are delivered to the segment of test and research. The segment of test and research logs in to theserver1 via theclient2 on the segment of test and research. Theclient2 on the segment of test and research checks various test points about stability under operating conditions, adaptation and the like, which are required by the circuit designer through theclient2 on the circuit designer.
The results of test performed about the test points are written to an electronic file and stored in the storing means4 of theserver1.
Of course, the test points includes a point of whether the electrical and electronic component delivered by the vendor is operated with stability in given environment for a given length of time. The tests are performed in the state in which whether the electrical and electronic component delivered by the vendor is implemented on a substrate provided in advance by the circuit designer on the condition set by the circuit designer.
The segment of test and research operates theclient2 thereof to transmit the results of the tests to theclient2 on the circuit designer by e-mail.
The circuit designer selects at least one or more electrical and electronic components concluded to be most desirable, and stores a purchase order in theserver1 by e-mail. At this time, the circuit designer considers the data of the tests, the purchase information about specifications, price and the like, and information about price per lot and delivery time transmitted by theclient2 on the vendor.
Theserver1 transmits a document relating to purchase on the basis of the purchase order to theclient2 on the vendor by e-mail.
The vendor sends the electrical and electronic component listed in the document relating to purchase to the segment of test and research or directly to the circuit designer, or sends the electrical and electronic component to the circuit designer wherein an acceptance test on the component has completed.
The vendor may be provided with a substrate for implementation from the circuit designer, and can implement on the substrate the electrical and electronic component purchased by the circuit designer and deliver the component. After receiving approval from the circuit designer, the vendor may distribute at cost the results of the tests in a segment of test and research on the electrical and electronic component purchased by the circuit designer.
Finally, the vendor sends a report about the completion of operation and a bill of the compensation for operation to and receives the compensation from the circuit designer. Thus, test operation and purchase operation as a proxy is completed.
As a consequence, the vendor can timely provide the circuit designer with an electrical and electronic component of high reliability at low cost wherein the component is compatible with the circuit design of the circuit designer, and the substrate with the component implemented thereon.
As described above, in the final analysis, the present invention has significant advantages as follows.
According to the first aspect of the present invention, log-in IDs for authenticating a server and client mutually are changed automatically with synchronizing to both of the server and client. Therefore, while retaining a high level of security a network system can use the open Internet. The price an electrical and electronic component varies frequently and performance thereof is improved rapidly, however, the second and fifth aspects of the present invention makes it possible to survey operation, a price and the like thereof, and to send the component at low cost. According to the third aspect of the present invention, a commercially available computer and Internet browser can be used as-is. According to the fourth aspect of the present invention, a network system of high reliability can be provided at low cost.